Insert JS or CSS in post via Custom Field Security & Risk Analysis

wordpress.org/plugins/insert-js-or-css-in-post-via-custom-field

This plugin will insert urls of JavaScript or CSS stylesheet files added into a particular posts or page via Custom Fields.

10 active installs v0.1 PHP + WP 2.0+ Updated Apr 1, 2013
cssjavascriptjspagepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Insert JS or CSS in post via Custom Field Safe to Use in 2026?

Generally Safe

Score 85/100

Insert JS or CSS in post via Custom Field has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "insert-js-or-css-in-post-via-custom-field" plugin, version 0.1, presents a mixed security posture. On the positive side, the static analysis reveals no apparent SQL injection vulnerabilities as all queries use prepared statements. Furthermore, there are no known CVEs associated with this plugin, and the absence of external HTTP requests, file operations, and dangerous function usage suggests a generally cautious approach to development in those areas. The plugin also has a very small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events. This indicates a limited entry point for potential attackers.

However, a significant concern arises from the output escaping analysis, which indicates that 100% of the single output identified is not properly escaped. This is a critical finding, as it opens the door to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious JavaScript into the site. Additionally, the lack of nonce checks and capability checks on any potential (though currently unlisted) entry points is a notable weakness, as these are fundamental security mechanisms for verifying user intent and permissions. The absence of taint analysis flows is also noteworthy, suggesting either the analysis tool couldn't find any, or the code's complexity didn't trigger the analysis, which could mask potential issues in more complex scenarios. The plugin's vulnerability history, while clean, is also very limited, which, combined with its low version number, may indicate it has not undergone extensive security scrutiny or real-world attack vectors.

In conclusion, while the plugin exhibits some good security practices by avoiding common pitfalls like raw SQL and a large attack surface, the unescaped output is a critical vulnerability that needs immediate attention. The lack of robust permission and nonce checks on any present entry points is also a significant concern. The plugin's limited history means its long-term security resilience is yet to be proven.

Key Concerns

  • Unescaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Insert JS or CSS in post via Custom Field Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Insert JS or CSS in post via Custom Field Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Insert JS or CSS in post via Custom Field Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headinsert-js-css-custom-field-fedmich.php:38
Maintenance & Trust

Insert JS or CSS in post via Custom Field Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedApr 1, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Insert JS or CSS in post via Custom Field Developer Profile

fedmich

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Insert JS or CSS in post via Custom Field

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- insert JS & CSS by Fedmich --><!-- /insert JS & CSS by Fedmich -->
FAQ

Frequently Asked Questions about Insert JS or CSS in post via Custom Field